(71) is used to ensure the confidentiality, integrity and authenticity of the two end points in the private network.(72),  an ap

admin2009-02-15  34

问题 (71) is used to ensure the confidentiality, integrity and authenticity of the two end points in the private network.(72),  an application-layer protocol, authenticates each peer in an IPsec transaction. IKE negotiates security policy, determining which algorithm may be used to set up the tunnel. It also handles the exchange of session keys used for that one transaction.Networks that use(73) to secure data traffic can automatically authenticate devices by using(74), which verify the identities of the two users who are sending information back and forth. IPsec can be ideal way to secure data in large networks that require(75) connections among many devices.

选项 A、secure
B、relation
C、script
D、strict

答案A

解析 加密可确保私用网络中两端点的保密性、完整性和认证性。因特网密钥交换(IKE应用层协议),认证IPsec交易中的每个节点。IKE谈判安全政策,确定哪种算法可以用来建立通道。它也处理用于交易事务中的会话密钥的交换。利用IPsec来确保数据流的网络,能通过使用数字证书,自动认证设备,这种证书验证来回发送信息的两个用户的身份。对在需要在很多设备之间安全连接的大型网络中确保数据安全,利用IPsec是一个理想的方法。
转载请注明原文地址:https://jikaoti.com/ti/enz7FFFM
0

相关试题推荐
最新回复(0)